MANAGEMENT

BUISENESS MANAGEMENT

RISK MANAGEMENT

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Francine is a security specialist for an online service provider in the United States. She recently received a claim from a copyright holder that a user is storing information on her service that violates the third party’s copyright. What law governs the actions that Francine must take?
A
Copyright Act
B
Lanham Act
C
Digital Millennium Copyright Act
D
Gramm Leach Bliley Act
Explanation: 

Detailed explanation-1: -Defense in depth states that organizations should have overlapping security controls designed to meet the same security objectives whenever possible. This approach provides security in the event of a single control failure.

Detailed explanation-2: -Confidentiality protects sensitive information from unauthorized disclosure or intelligible interception. Cryptography and access control are used to protect confidentiality.

Detailed explanation-3: -SLAs do not normally address issues of data confidentiality. Those provisions are normally included in a non-disclosure agreement (NDA).

Detailed explanation-4: -What information security principle is the keylogger most likely designed to disrupt? confidentiality.

There is 1 question to complete.